Lucene search

K
nvd[email protected]NVD:CVE-2022-48337
HistoryFeb 20, 2023 - 11:15 p.m.

CVE-2022-48337

2023-02-2023:15:12
CWE-78
web.nvd.nist.gov
gnu emacs
etags.c
shell metacharacters
command execution
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.0%

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the โ€œetags -u *โ€ command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

Affected configurations

NVD
Node
gnuemacsRangeโ‰ค28.2
Node
debiandebian_linuxMatch11.0

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.0%